浏览全部资源
扫码关注微信
1. 东南大学网络空间安全学院,江苏 南京 211189
2. 网络通信与安全紫金山实验室,江苏 南京 211111
[ "姜禹(1981− ),男,博士,东南大学网络空间安全学院副教授,主要研究方向为物理层安全、无线网络安全、RFID技术、物联网技术等" ]
[ "陈思卿(1996− ),男,东南大学网络空间安全学院硕士生,主要研究方向为物理层安全、无线网络安全、RFID技术、物联网技术等" ]
[ "孙雯(1988− ),女,博士,东南大学网络空间安全学院讲师,主要研究方向为物理层安全、无线网络安全、人工智能、物联网技术等" ]
纸质出版日期:2021-12-30,
网络出版日期:2021-12,
移动端阅览
姜禹, 陈思卿, 孙雯. 基于射频指纹的LoRa网络安全方案研究[J]. 物联网学报, 2021,5(4):17-25.
YU JIANG, SIQING CHEN, WEN SUN. Research on LoRa network security schemes based on RF fingerprint. [J]. Chinese journal on internet of things, 2021, 5(4): 17-25.
姜禹, 陈思卿, 孙雯. 基于射频指纹的LoRa网络安全方案研究[J]. 物联网学报, 2021,5(4):17-25. DOI: 10.11959/j.issn.2096-3750.2021.00228.
YU JIANG, SIQING CHEN, WEN SUN. Research on LoRa network security schemes based on RF fingerprint. [J]. Chinese journal on internet of things, 2021, 5(4): 17-25. DOI: 10.11959/j.issn.2096-3750.2021.00228.
远距离无线电(LoRa
long range radio)凭其远距离、低功耗的优点在物联网中应用广泛,但目前LoRa网络还没有可靠的安全方案,无法保证通信安全。为此,基于射频指纹的唯一性和难以篡改性,提出接收请求接入的LoRa终端的射频信号,提取指纹并标注,与根据需求自定义的多尺度安全规则匹配来判断终端身份是否安全,采取对应安全措施。据此,对原有 LoRa 网关及 LoRa 网络架构进行改进,设计了全新的工作流程,提出了两种LoRa网络安全方案。提出的LoRa网络安全方案从物理层实现LoRa终端身份认证和接入控制,仅需针对原有网关及其工作逻辑进行改进,无须改造数量巨大的LoRa终端,在不影响原有LoRaWAN安全机制工作的基础上,给LoRa物联网应用添加新的安全措施和保障,具有很高的实用价值。
Long range radio (LoRa) is widely used in the IoT due to its advantages of long distance and low power consumption.However
LoRa network has no reliable security scheme currently
making it unable to guarantee the communication security.Therefore
based on the uniqueness and tamper-resistance of radio frequency fingerprint
it was proposed to receive radio frequency signals of the LoRa end nodes which requested access
extract the fingerprints from them
mark it and match with the customized multi-scale security rules according to demands to decide whether the identities of the LoRa end nodes were safe
taking security measures accordingly.Based on this
original LoRa gateway and LoRa network architecture were improved
new workflows were designed
and two LoRa network security schemes were proposed.The two LoRa network security schemes were proposed which implement identity authentication and access control of the LoRa end nodes from the physical layer.It is only needed to improve the original LoRa gateway in the LoRa network architecture and its workflow
which adds new security measures and guarantees for LoRa applications on the basis of not affecting the original LoRaWAN security mechanism
with no need to modify a huge number of LoRa end nodes.The security schemes proposed have high practical value.
射频指纹物理层安全接入控制LoRa网关LoRa网络安全
RF fingerprintphysical layer securityaccess controlLoRa gatewayLoRa network security
NEUMANN P, MONTAVONT J, NOËL T, . Indoor deployment of low-power wide area networks (LPWAN):a LoRaWAN case study[C]// 2016 IEEE 12th International Conference on Wireless and Mobile Computing,Networking and Communications (WiMob). Piscataway:IEEE Press, 2016: 1-8.
SANCHEZ-IBORRA R, SÁNCHEZ-GÓMEZ J, PÉREZ S ,et al. Enhancing LoRaWAN security through a lightweight and authenticated key management approach[J]. Sensors, 2018,18(6): 1833.
ZULIAN S . Security threat analysis and countermeasures for LoRaWAN join procedure[EB]. 2015.
KIM J, SONG J . A dual key-based activation scheme for secure LoRaWAN[J]. Wireless Communications and Mobile Computing, 2017,2017: 1-12.
ARAS E, RAMACHANDRAN G S, LAWRENCE P ,et al. Exploring the security vulnerabilities of LoRa[C]// 2017 3rd IEEE International Conference on Cybernetics (CYBCONF). Piscataway:IEEE Press, 2017: 1-6.
DANEV B, ZANETTI D, CAPKUN S . On physical-layer identification of wireless devices[J]. ACM Computing Surveys, 2012,45(1): 1-29.
袁红林, 胡爱群 . 射频指纹的产生机理与惟一性[J]. 东南大学学报(自然科学版), 2009,39(2): 230-233.
YUAN H L, HU A Q . Fountainhead and uniqueness of RF fingerprint[J]. Journal of Southeast University (Natural Science Edition), 2009,39(2): 230-233.
DE CARVALHO SILVA J, RODRIGUES J J P C, ALBERTI A M ,et al. LoRaWAN—A low power WAN protocol for Internet of Things:a review and opportunities[C]// 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech). Piscataway:IEEE Press, 2017: 1-6.
BEHRAD S, TUFFIN S, BERTIN E ,et al. Network access control for the IoT:a comparison between cellular,Wi-Fi and LoRaWAN[C]// 2019 22nd Conference on Innovation in Clouds,Internet and Networks and Workshops (ICIN). Piscataway:IEEE Press, 2019: 195-200.
SANTAMARIA M, MARCHIORI A . Demystifying LoRa WAN security and capacity[C]// 2019 29th International Telecommunication Networks and Applications Conference (ITNAC). Piscataway:IEEE Press, 2019: 1-7.
YANG X Y, KARAMPATZAKIS E, DOERR C ,et al. Security vulnerabilities in LoRaWAN[C]// 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). Piscataway:IEEE Press, 2018: 129-140.
SANCHEZ-IBORRA R, SÁNCHEZ-GÓMEZ J, PEREZ S ,et al. Internet access for LoRaWAN devices considering security issues[C]// 2018 Global Internet of Things Summit (GIoTS). Piscataway:IEEE Press, 2018: 1-6.
BUTUN I, PEREIRA N, GIDLUND M . Security risk analysis of LoRaWAN and future directions[J]. Future Internet, 2018,11(1): 3.
BASU D, GU T B, MOHAPATRA P ,et al. Security issues of low power wide area networks in the context of LoRanetworks[EB]. 2020.
CHACKO S, JOB M D . Security mechanisms and Vulnerabilities in LPWAN[J]. IOP Conference Series:Materials Science and Engineering, 2018,396:012027.
VANGELISTA L . Frequency shift chirp modulation:the LoRa modulation[J]. IEEE Signal Processing Letters, 2017,24(12): 1818-1821.
DEMERS F, ST-HILAIRE M,, . Radiometric identification of LTE transmitters[C]// 2013 IEEE Global Communications Conference (GLOBECOM). Piscataway:IEEE Press, 2013: 4116-4121.
ROMERO H P, REMLEY K A, WILLIAMS D F ,et al. Electromagnetic measurements for counterfeit detection of radio frequency identification cards[J]. IEEE Transactions on Microwave Theory and Techniques, 2009,57(5): 1383-1387.
PENG L N, HU A Q, JIANG Y ,et al. A differential constellation trace figure based device identification method for ZigBee nodes[C]// 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP). Piscataway:IEEE Press, 2016.
CHEONG P S, BERGS J, HAWINKEL C ,et al. Comparison of LoRaWAN classes and their power consumption[C]// 2017 IEEE Symposium on Communications and Vehicular Technology (SCVT). Piscataway:IEEE Press, 2017: 1-6.
GHANAATIAN R, AFISIADIS O, COTTING M ,et al. Lora digital receiver analysis and implementation[C]// ICASSP 2019-2019 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP). Piscataway:IEEE Press, 2019.
JOACHIM T . Complete reverse engineering of LoRa PHY[EB]. 2019.
0
浏览量
536
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构